磁力管家

磁力管家
为您索检到186条磁力链接,耗时0毫秒。 rss

分享给好友

【影视】 [ FreeCourseWeb.com ] EC-Council - Introduction to Cybersecurity
收录时间:2024-01-16 文档个数:49 文档大小:1.2 GB 最近下载:2025-05-16 人气:1606 磁力链接
  • mp4~Get Your Files Here !/38 - Know Your Options for Data Encryption.mp4 63.3 MB
  • mp4~Get Your Files Here !/35 - Looking at an Application Designed to Help Secure Your Phone.mp4 39.8 MB
  • mp4~Get Your Files Here !/9 - Using a Password Manager.mp4 39.7 MB
  • mp4~Get Your Files Here !/40 - Checking if Your Cloud Server is Leaking Data.mp4 39.5 MB
  • mp4~Get Your Files Here !/23 - Understanding How Computers Can Become Infected.mp4 38.9 MB
  • mp4~Get Your Files Here !/26 - Being Careful of What You Post.mp4 36.8 MB
  • mp4~Get Your Files Here !/19 - Looking at Fake Error Messages (Scareware).mp4 35.8 MB
  • mp4~Get Your Files Here !/14 - USB Safety with Examples.mp4 34.9 MB
  • mp4~Get Your Files Here !/20 - Exploring Useful Browser Plugins.mp4 34.2 MB
  • mp4~Get Your Files Here !/41 - Getting to Know Everything about VPN.mp4 34.0 MB
  • mp4~Get Your Files Here !/8 - Exploring What Makes a Good Password.mp4 34.0 MB
  • mp4~Get Your Files Here !/25 - What to Do If You Are Infected with Cryptoware.mp4 34.0 MB
  • mp4~Get Your Files Here !/42 - Changing Your DNS Connection to Avoid ISP Snooping.mp4 33.5 MB
  • mp4~Get Your Files Here !/32 - Understanding Best Practices for Unusual E-mails.mp4 31.1 MB
  • mp4~Get Your Files Here !/31 - Learning How to Identify and Find Phishing E-mails.mp4 30.9 MB
  • mp4~Get Your Files Here !/44 - Learning How to Use TorGhost.mp4 30.3 MB
  • mp4~Get Your Files Here !/18 - Downloading Precautions and Hash Checking.mp4 30.3 MB
  • mp4~Get Your Files Here !/24 - Learning Best Practices for Antivirus Software and Malware Scanners.mp4 27.8 MB
  • mp4~Get Your Files Here !/37 - Additional Settings.mp4 27.6 MB
  • mp4~Get Your Files Here !/47 - Understanding Backup Methods.mp4 26.3 MB
【影视】 [ FreeCourseWeb.com ] ISO 27001 - 2022-Compliant Cybersecurity - The Annex A Controls
收录时间:2024-01-12 文档个数:97 文档大小:310.4 MB 最近下载:2025-05-16 人气:10551 磁力链接
  • mp4~Get Your Files Here !/13 - 12. Threat and Vulnerability Management and Secure Configuration/02 - Secure configuration (Controls 8.9, 8.19, and 8.24).mp4 14.2 MB
  • mp4~Get Your Files Here !/07 - 6. Information Security Event Management/01 - Information security incident management (Controls 5.24–5.28, and 6.8).mp4 13.3 MB
  • mp4~Get Your Files Here !/05 - 4. Identity and Access Management/01 - Access management (Controls 5.15–5.18).mp4 12.9 MB
  • mp4~Get Your Files Here !/04 - 3. Information Protection/02 - Deletion, masking, DLP, and test data (Controls 8.10–8.12, and 8.33).mp4 12.7 MB
  • mp4~Get Your Files Here !/08 - 7. Continuity/01 - Continuity (Controls 5.29, 5.30, and 8.13).mp4 12.4 MB
  • mp4~Get Your Files Here !/14 - 13. Application Security/01 - Secure development (Controls 8.25–8.28).mp4 12.4 MB
  • mp4~Get Your Files Here !/10 - 9. Human Resource Security/02 - During employment (Controls 6.3–6.6).mp4 12.3 MB
  • mp4~Get Your Files Here !/12 - 11. System and Network Security/01 - Network security management (Controls 8.20–8.23).mp4 12.1 MB
  • mp4~Get Your Files Here !/12 - 11. System and Network Security/02 - Protection of information systems (Controls 8.7, 8.18, 8.30, and 8.34).mp4 11.8 MB
  • mp4~Get Your Files Here !/14 - 13. Application Security/02 - Testing, separate environments, and change management (Controls 8.29, 8.31, and 8.32).mp4 11.7 MB
  • mp4~Get Your Files Here !/05 - 4. Identity and Access Management/02 - System and application access control (Controls 8.2–8.5).mp4 11.6 MB
  • mp4~Get Your Files Here !/02 - 1. Governance/03 - Contacts and project management (Controls 5.5, 5.6, and 5.8).mp4 11.0 MB
  • mp4~Get Your Files Here !/03 - 2. Asset Management/01 - Responsibility for information assets (Controls 5.9, 5.10, 6.7, and 8.1).mp4 10.8 MB
  • mp4~Get Your Files Here !/04 - 3. Information Protection/01 - Classification, labeling, and privacy (Controls 5.12, 5.13, and 5.34).mp4 10.8 MB
  • mp4~Get Your Files Here !/02 - 1. Governance/02 - Roles, responsibilities, and duties (Controls 5.2–5.4).mp4 10.4 MB
  • mp4~Get Your Files Here !/02 - 1. Governance/01 - Policies for information security (Control 5.1).mp4 10.1 MB
  • mp4~Get Your Files Here !/07 - 6. Information Security Event Management/02 - Logging and monitoring (Controls 8.15–8.17).mp4 9.9 MB
  • mp4~Get Your Files Here !/06 - 5. Supplier Relationships Security/01 - Supplier relationships security (Controls 5.19–5.21).mp4 9.6 MB
  • mp4~Get Your Files Here !/06 - 5. Supplier Relationships Security/02 - Managing supplier service delivery and cloud services security (Controls 5.22 and 5.23).mp4 9.6 MB
  • mp4~Get Your Files Here !/13 - 12. Threat and Vulnerability Management and Secure Configuration/01 - Threat and vulnerability management (Controls 5.7 and 8.8).mp4 9.5 MB
【影视】 Implementing the NIST Cybersecurity Framework
收录时间:2024-01-10 文档个数:127 文档大小:4.3 GB 最近下载:2025-05-16 人气:874 磁力链接
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/2. Using the NIST Cybersecurity Framework/5. Finding the Controls.mp4 307.2 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/6. Five Functions.mp4 231.8 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/7. Controls and Outcomes.mp4 205.8 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/5. Framework Components.mp4 197.5 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/3. Value Proposition.mp4 181.0 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/1. Welcome.mp4 161.5 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/5. Generate Questionnaire.mp4 153.5 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/2. Using the NIST Cybersecurity Framework/1. Using the Core.mp4 149.0 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/2. Intel (Microchip Manufacturing).mp4 143.5 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/5. Implementing Phase Two of the CR-MAP/4. Business Value Analysis.mp4 139.8 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/4. DOE (Energy Industry).mp4 139.0 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/7. Conduct Interviews.mp4 136.2 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/7. Conclusion/1. BONUS - Conclusion.mp4 126.4 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/3. Cimpress (Promotional Products).mp4 123.9 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/6. Saudi Aramco (Oil Industry).mp4 118.9 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/1. Introduction to the NIST Cybersecurity Framework/4. Intended Audience.mp4 112.2 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/3. Real World Case Studies/5. Western Australia (Local Government).mp4 112.1 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/6. Choose Target Scores.mp4 100.5 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/6. Implementing Phase Three of the CR-MAP/3. Quarterly Reviews.mp4 99.8 MB
  • mp4[TutsNode.com] - Implementing the NIST Cybersecurity Framework/4. Implementing Phase One of the CR-MAP/1. Phase One.mp4 93.8 MB
【影视】 Aerospace Cybersecurity - Satellite Hacking (W53)
收录时间:2024-01-09 文档个数:28 文档大小:2.9 GB 最近下载:2025-04-09 人气:105 磁力链接
  • mp4Module 1 - Satellite Reconnaissance/7. (W53M01) Python Programs for Satellite Reconnaissance.mp4 303.7 MB
  • mp4Module 1 - Satellite Reconnaissance/6. (W53M01) OSINT Tools for Satellite Data Extraction.mp4 253.1 MB
  • mp4Module 1 - Satellite Reconnaissance/4. (W53M01) Satellite Subsystems and Attack Surfaces.mp4 206.3 MB
  • mp4Module 3 - Reverse Engineering and Decoding Communication/4. (W53M03) Decoding Satellite Communications Using SatNogs and Reverse Engineering.mp4 176.2 MB
  • mp4Module 4 - Vulnerabilities and Attacks/4. (W53M04) Dive Further Into Attacks and More CTF Practice.mp4 174.4 MB
  • mp4Module 3 - Reverse Engineering and Decoding Communication/1. (W53M03) Overview of Satellite Communications.mp4 168.9 MB
  • mp4Module 1 - Satellite Reconnaissance/2. (W53M01) Satellites and Ground Stations.mp4 168.2 MB
  • mp4Module 2 - Communication Analysis and Eavesdropping/3. (W53M02) Command & Data Handling & Payloads.mp4 162.6 MB
  • mp4Module 1 - Satellite Reconnaissance/5. (W53M01) Spherical Grid System.mp4 161.0 MB
  • mp4Module 3 - Reverse Engineering and Decoding Communication/3. (W53M03) Decoding Communications Using Wireshark and GNU Radio.mp4 148.0 MB
  • mp4Module 4 - Vulnerabilities and Attacks/1. (W53M04) Common Attacks and Interactive Labs.mp4 137.0 MB
  • mp4Module 2 - Communication Analysis and Eavesdropping/1. (W53M02) Communication Foundations.mp4 135.6 MB
  • mp4Module 3 - Reverse Engineering and Decoding Communication/2. (W53M03) Analyzing Satellite Communication Using gpredict, SatDump, & WXtolMG.mp4 135.3 MB
  • mp4Module 4 - Vulnerabilities and Attacks/3. (W53M04) Detecting Attacks and Mitigation Strategies.mp4 128.6 MB
  • mp4Module 2 - Communication Analysis and Eavesdropping/2. (W53M02) Link Design & Protocols.mp4 113.8 MB
  • mp4Module 2 - Communication Analysis and Eavesdropping/4. (W53M02) Satellite Networks & Vulnerabilities.mp4 89.2 MB
  • mp4Module 4 - Vulnerabilities and Attacks/2. (W53M04) Future of Satellite Security and Next Steps.mp4 85.1 MB
  • mp4Module 1 - Satellite Reconnaissance/1. (W53M01) Introduction.mp4 79.1 MB
  • mp4Module 1 - Satellite Reconnaissance/3. (W53M01) Information Extraction Methods.mp4 78.3 MB
  • vttModule 1 - Satellite Reconnaissance/4. (W53M01) Satellite Subsystems and Attack Surfaces.vtt 45.2 kB
【影视】 ZeroToMastery - Complete Cybersecurity Bootcamp
收录时间:2024-01-09 文档个数:97 文档大小:3.6 GB 最近下载:2025-05-15 人气:2777 磁力链接
  • mp48-Network Security/052-Network Security With Nmap.mp4 169.9 MB
  • mp45-Security Bugs & Vulnerabilities/020-Buffer Overflow Demonstration.mp4 136.7 MB
  • mp412-Appendix - Ethical Hacking/087-Msfconsole Basic Commands.mp4 97.5 MB
  • mp48-Network Security/059-Wireless Attack Demonstration.mp4 93.4 MB
  • mp47-End-Point Protection/034-Password Security and Password Managers.mp4 84.2 MB
  • mp412-Appendix - Ethical Hacking/093-Meterpreter Basic Commands Part 1.mp4 78.5 MB
  • mp47-End-Point Protection/038-Process Explorer.mp4 75.8 MB
  • mp41-Introduction/001-Cybersecurity Bootcamp - Zero to Mastery.mp4 72.4 MB
  • mp48-Network Security/057-Secure Network Architecture.mp4 66.8 MB
  • mp412-Appendix - Ethical Hacking/094-Meterpreter Basic Commands Part 2.mp4 65.7 MB
  • mp47-End-Point Protection/033-Bitdefender, Kaspersky, McAfee, Malwarebytes.mp4 63.9 MB
  • mp44-Understanding Hackers - The Biggest Threat/012-Most Common Attacks Demonstration.mp4 63.5 MB
  • mp48-Network Security/060-Network Monitoring With TCPDump.mp4 62.7 MB
  • mp48-Network Security/058-Wireless Security.mp4 59.6 MB
  • mp45-Security Bugs & Vulnerabilities/017-Unpatched Machine Exploitation Demonstration.mp4 59.1 MB
  • mp412-Appendix - Ethical Hacking/080-Whatweb Stealthy Scan.mp4 58.1 MB
  • mp412-Appendix - Ethical Hacking/091-Advance Msfvenom Usage.mp4 51.4 MB
  • mp47-End-Point Protection/043-Iptables.mp4 50.9 MB
  • mp47-End-Point Protection/028-Brave Browser Security and Privacy.mp4 50.6 MB
  • mp412-Appendix - Ethical Hacking/089-Software Vulnerability - Samba Exploitation.mp4 49.5 MB
【影视】 [ DevCourseWeb.com ] Udemy - Intro To Cybersecurity In Healthcare (1 Of 2),Plain and Simple
收录时间:2024-01-09 文档个数:19 文档大小:1.2 GB 最近下载:2025-05-14 人气:1334 磁力链接
  • mp4~Get Your Files Here !/5 - Something You Own FOB MFA.mp4 258.8 MB
  • mp4~Get Your Files Here !/6 - Something You Are Biometrics.mp4 227.0 MB
  • mp4~Get Your Files Here !/7 - Authenticating Access FIDO.mp4 184.5 MB
  • mp4~Get Your Files Here !/2 - Overview of Cyber Security.mp4 182.9 MB
  • mp4~Get Your Files Here !/8 - Phishing & Spam.mp4 145.1 MB
  • mp4~Get Your Files Here !/4 - Something You Know Passwords.mp4 70.9 MB
  • mp4~Get Your Files Here !/3 - Authenticating Mechanisms.mp4 61.8 MB
  • mp4~Get Your Files Here !/1 - Introduction.mp4 49.6 MB
  • vtt~Get Your Files Here !/5 - Something You Own FOB MFA English.vtt 22.0 kB
  • vtt~Get Your Files Here !/6 - Something You Are Biometrics English.vtt 18.2 kB
  • vtt~Get Your Files Here !/7 - Authenticating Access FIDO English.vtt 17.5 kB
  • vtt~Get Your Files Here !/2 - Overview of Cyber Security English.vtt 13.9 kB
  • vtt~Get Your Files Here !/8 - Phishing & Spam English.vtt 12.3 kB
  • vtt~Get Your Files Here !/4 - Something You Know Passwords English.vtt 6.0 kB
  • vtt~Get Your Files Here !/3 - Authenticating Mechanisms English.vtt 6.0 kB
  • vtt~Get Your Files Here !/1 - Introduction English.vtt 4.5 kB
  • txt~Get Your Files Here !/Bonus Resources.txt 386 Bytes
  • html~Get Your Files Here !/9 - BONUS SECTION.html 243 Bytes
  • urlGet Bonus Downloads Here.url 182 Bytes
【影视】 The Complete Certified in Cybersecurity course (CC) - 2022
收录时间:2024-01-07 文档个数:293 文档大小:6.7 GB 最近下载:2025-05-16 人气:902 磁力链接
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/7. The study process, material, tips, tricks and practice tests!/1. How to approach practice questions.mp4 124.3 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/6. Domain 5 Security Operations/16. Administrative (Directive) Controls.mp4 122.3 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/5. The OSI Model - Part 1.mp4 108.0 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/7. The study process, material, tips, tricks and practice tests!/4. How to design your career and certification path..mp4 97.4 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/4. Domain 3 Access Controls Concepts/12. Logical Access Control - Part 5.mp4 89.7 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/44. Virtualization, Cloud, and Distributed Computing - Part 5.mp4 87.1 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/24. VPNs, NAC, and third-party connectivity.mp4 86.7 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/43. Virtualization, Cloud, and Distributed Computing - Part 4.mp4 81.3 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/10. IP addresses, port numbers, and MAC addresses - Part 1.mp4 80.0 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/6. Domain 5 Security Operations/19. Social Engineering attacks - Part 2.mp4 79.6 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/3. Domain 2 Business Continuity, Disaster Recovery, and Incident Response/6. DRP - Disaster Recovery Planning - Part 1.mp4 79.4 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/2. Network Basics and Definitions - Part 1.mp4 79.0 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/3. Domain 2 Business Continuity, Disaster Recovery, and Incident Response/9. DRP - Disaster Recovery Planning - Part 4.mp4 78.9 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/4. Domain 3 Access Controls Concepts/10. Logical Access Control - Part 3.mp4 78.1 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/2. CC Domain 1 Security Principles/28. Laws and regulations - part 1.mp4 77.6 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/6. Domain 5 Security Operations/13. Data handling, data storage and data retention - Part 2.mp4 77.4 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/4. Domain 3 Access Controls Concepts/2. Physical Security - part 1.mp4 75.4 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/2. CC Domain 1 Security Principles/30. Security governance principles.mp4 75.0 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/48. Electricity.mp4 74.7 MB
  • mp4[TutsNode.net] - The Complete Certified in Cybersecurity course (CC) - 2022/5. Domain 4 Network Security/28. Attacks and attackers - Part 2.mp4 73.6 MB
【影视】 [ CourseWikia.com ] CompTIA Cybersecurity Analyst + (CySA + ) (CS0-003) - 2 Vulnerability Management
收录时间:2024-01-06 文档个数:172 文档大小:614.3 MB 最近下载:2025-05-15 人气:4833 磁力链接
  • mp4~Get Your Files Here !/09 - 8. More Cybersecurity Tools/05 - Control frameworks.mp4 21.9 MB
  • mp4~Get Your Files Here !/10 - 9. Software Development Lifecycle/02 - Development methodologies.mp4 18.1 MB
  • mp4~Get Your Files Here !/12 - 11. Software Quality Assurance/03 - Fuzzing.mp4 16.9 MB
  • mp4~Get Your Files Here !/07 - 6. Software Security Issues/16 - Interception proxies.mp4 13.7 MB
  • mp4~Get Your Files Here !/06 - 5. Common Vulnerabilities/01 - Server vulnerabilities.mp4 13.0 MB
  • mp4~Get Your Files Here !/09 - 8. More Cybersecurity Tools/02 - Cloud auditing tools.mp4 13.0 MB
  • mp4~Get Your Files Here !/15 - 14. Risk Management/05 - Risk visibility and reporting.mp4 12.7 MB
  • mp4~Get Your Files Here !/09 - 8. More Cybersecurity Tools/01 - Exploitation frameworks.mp4 12.3 MB
  • mp4~Get Your Files Here !/08 - 7. Specialized Technology Vulnerabilities/01 - Industrial control systems.mp4 11.5 MB
  • mp4~Get Your Files Here !/04 - 3. Configuring and Executing Vulnerability Scans/02 - Scan configuration.mp4 11.4 MB
  • mp4~Get Your Files Here !/03 - 2. Network Mapping/02 - Install Nmap on Windows.mp4 11.0 MB
  • mp4~Get Your Files Here !/07 - 6. Software Security Issues/01 - OWASP Top 10.mp4 10.9 MB
  • mp4~Get Your Files Here !/15 - 14. Risk Management/02 - Quantitative risk assessment.mp4 10.7 MB
  • mp4~Get Your Files Here !/08 - 7. Specialized Technology Vulnerabilities/03 - Embedded systems.mp4 10.6 MB
  • mp4~Get Your Files Here !/02 - 1. Creating a Vulnerability Management Program/03 - Scan frequency.mp4 10.5 MB
  • mp4~Get Your Files Here !/02 - 1. Creating a Vulnerability Management Program/02 - Identify scan targets.mp4 10.2 MB
  • mp4~Get Your Files Here !/07 - 6. Software Security Issues/08 - Overflow attacks.mp4 9.9 MB
  • mp4~Get Your Files Here !/07 - 6. Software Security Issues/10 - Session hijacking.mp4 9.6 MB
  • mp4~Get Your Files Here !/15 - 14. Risk Management/03 - Risk treatment options.mp4 9.5 MB
  • mp4~Get Your Files Here !/07 - 6. Software Security Issues/04 - Request forgery.mp4 9.4 MB
【影视】 [ DevCourseWeb.com ] Udemy - Selection and Implementation of Cybersecurity Risks Controls
收录时间:2024-01-05 文档个数:36 文档大小:2.0 GB 最近下载:2025-05-15 人气:2662 磁力链接
  • mp4~Get Your Files Here !/2. SECTION-2/8. 19- The role of governance in the effective selection and implementation of cybe.mp4 142.9 MB
  • mp4~Get Your Files Here !/2. SECTION-2/14. 23-Selecting and implementing cybersecurity controls based on NIST CSF PT2.mp4 122.4 MB
  • mp4~Get Your Files Here !/2. SECTION-2/16. 25- Measuring the effectiveness of implemented controls.mp4 117.4 MB
  • mp4~Get Your Files Here !/2. SECTION-2/17. Putting it all together-The Selection and Implementation of Cyber Risks controls.mp4 115.7 MB
  • mp4~Get Your Files Here !/1. Introduction/10. 9-Key considerations for the identification- selection & implementation of contr.mp4 101.8 MB
  • mp4~Get Your Files Here !/1. Introduction/7. 6-Approach to Control Selection_ pt2.mp4 94.1 MB
  • mp4~Get Your Files Here !/2. SECTION-2/9. 20-Why not implement frameworks that already have recommended controls.mp4 90.3 MB
  • mp4~Get Your Files Here !/2. SECTION-2/15. 24-Implementation Plan for selected controls.mp4 87.1 MB
  • mp4~Get Your Files Here !/2. SECTION-2/11. 21-Challenges, & considerations associated with implementing frameworks-pt2.mp4 82.9 MB
  • mp4~Get Your Files Here !/1. Introduction/11. 10-Risk Assessment-BIA, Control Selection, Cost Benefit Analysis.mp4 81.1 MB
  • mp4~Get Your Files Here !/1. Introduction/9. 8-Introduction to security controls.mp4 77.4 MB
  • mp4~Get Your Files Here !/2. SECTION-2/7. 18-Documenting Cybersecurity Risk Assessment Report-Pt2.mp4 75.5 MB
  • mp4~Get Your Files Here !/2. SECTION-2/5. 17-Determine likelihood, Impact, Calculate risk.mp4 72.4 MB
  • mp4~Get Your Files Here !/2. SECTION-2/13. 23-Selecting and implementing cybersecurity controls based on NIST CSF PT1.mp4 62.9 MB
  • mp4~Get Your Files Here !/1. Introduction/12. 11-Cost Benefit Analysis associated with controls selection.mp4 58.3 MB
  • mp4~Get Your Files Here !/2. SECTION-2/3. 15-Steps involved in assessing the identified cyber risks in web server.mp4 55.0 MB
  • mp4~Get Your Files Here !/2. SECTION-2/1. 14-High-level process of selecting controls to protect ecommerce web server-Pt1.mp4 54.5 MB
  • mp4~Get Your Files Here !/1. Introduction/14. 13-Regulatory Compliance, Incident Response Planning.mp4 53.9 MB
  • mp4~Get Your Files Here !/1. Introduction/13. 12- Technology integration, operational impact, continuous monitoring, employee.mp4 52.8 MB
  • mp4~Get Your Files Here !/2. SECTION-2/6. 18- Documenting Cybersecurity Risk Assessment Report-Pt1.mp4 50.4 MB
【影视】 [CourseClub.Me] ITProTV - NIST Cybersecurity And Risk Management Frameworks
收录时间:2024-01-03 文档个数:61 文档大小:11.3 GB 最近下载:2025-05-16 人气:3755 磁力链接
  • mp42. NIST Cybersecurity and Publications.mp4 298.0 MB
  • mp426. Response Training and Testing.mp4 288.9 MB
  • mp424. Incident Response Plan Examples.mp4 279.3 MB
  • mp443. Documentation and Approval.mp4 277.5 MB
  • mp420. System Auditing and Logging.mp4 258.9 MB
  • mp423. Response Planning.mp4 255.7 MB
  • mp429. Backup and Recovery.mp4 251.4 MB
  • mp49. Inventory of Critical Assets.mp4 247.4 MB
  • mp446. Documenting Controls.mp4 246.5 MB
  • mp421. Monitoring and Alerting.mp4 238.7 MB
  • mp422. Assessments.mp4 238.7 MB
  • mp442. Control Allocation and Monitoring.mp4 234.0 MB
  • mp410. Business Impact Assessment.mp4 231.6 MB
  • mp440. NIST Control Documents.mp4 230.2 MB
  • mp436. Establishing Scope.mp4 227.5 MB
  • mp444. Security Control Implementation.mp4 225.8 MB
  • mp43. NIST Relationships.mp4 222.6 MB
  • mp46. The Vocabulary of Risk.mp4 222.0 MB
  • mp425. Digital Forensics.mp4 219.4 MB
  • mp451. Assessment Documentation.mp4 219.2 MB
【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity Exam Fundamentals
收录时间:2024-01-01 文档个数:70 文档大小:2.5 GB 最近下载:2025-05-07 人气:1486 磁力链接
  • mp4~Get Your Files Here !/05 - Nmap/001 Video and Lab - Introduction to NMap.mp4 220.2 MB
  • mp4~Get Your Files Here !/05 - Nmap/006 Video and lab - NMap Scripting Engine (NSE).mp4 209.4 MB
  • mp4~Get Your Files Here !/08 - Privilege Escalation/003 Video and Lab - Windows Privilege Escalation Unquoted Service Path.mp4 134.3 MB
  • mp4~Get Your Files Here !/07 - Reverse Shells and Persistant Connections/002 Video and Lab - Service Persistence.mp4 121.9 MB
  • mp4~Get Your Files Here !/08 - Privilege Escalation/002 Video and Lab - Verify Windows Privilege Escalation Unquoted Service Path.mp4 117.8 MB
  • mp4~Get Your Files Here !/07 - Reverse Shells and Persistant Connections/001 Video and Lab - Establish a Meterpreter Session with Windows 10 Pro.mp4 111.6 MB
  • mp4~Get Your Files Here !/09 - OWASP top 10 Mitigations/003 Video and Lab - Identify Active Network Hosts and Services Using Nmap.mp4 99.0 MB
  • mp4~Get Your Files Here !/02 - Virtual Lab Build/001 Video and Lab - Create a Virtual Install of Kali Linux.mp4 97.9 MB
  • mp4~Get Your Files Here !/02 - Virtual Lab Build/002 Video and Lab - Creating a Virtual Install of Metasploitable2 Using VirtualBox.mp4 87.9 MB
  • mp4~Get Your Files Here !/06 - 2.0 Information Gathering and Vulnerability Identification Labs/002 Video and Lab - Enumerating Windows 10 Using WinPEAS.mp4 75.0 MB
  • mp4~Get Your Files Here !/03 - Documentation/005 Video and PPT - Pentesting Final Report.mp4 65.4 MB
  • mp4~Get Your Files Here !/10 - Web Applications Penetration Testing/001 Video and Lab - Configuring BurpSuite as a Proxy.pdf.mp4 65.1 MB
  • mp4~Get Your Files Here !/09 - OWASP top 10 Mitigations/001 Video and PPT - Overview of OWASP Top 10.mp4 62.5 MB
  • mp4~Get Your Files Here !/05 - Nmap/007 Video - Analyzing NMap Results.mp4 61.0 MB
  • mp4~Get Your Files Here !/05 - Nmap/003 Video - Nmap OS Detection.mp4 59.8 MB
  • mp4~Get Your Files Here !/09 - OWASP top 10 Mitigations/004 Video and Lab - Perform a Vulnerability Scan Using OWASP Zed Attack Proxy.mp4 56.5 MB
  • mp4~Get Your Files Here !/09 - OWASP top 10 Mitigations/002 Video and Lab - Spoof Fake TCPIP Packets Using Hping3.mp4 56.2 MB
  • mp4~Get Your Files Here !/11 - Program Scripting/001 Video and Lab - Create a Windows Reverse Shell Using the PowerShell.mp4 55.9 MB
  • mp4~Get Your Files Here !/07 - Reverse Shells and Persistant Connections/003 Video and Lab - Create a Windows Reverse Shell Using PowerShell.mp4 55.9 MB
  • mp4~Get Your Files Here !/06 - 2.0 Information Gathering and Vulnerability Identification Labs/001 Video and lab - Using Banner Grabbing to Aid in Reconnaissance.mp4 55.8 MB
【影视】 [ FreeCourseWeb.com ] Cisco Certified Support Technician (CCST) - Cybersecurity
收录时间:2023-12-30 文档个数:40 文档大小:1.6 GB 最近下载:2025-05-16 人气:4474 磁力链接
  • mp4~Get Your Files Here !/4. Endpoint Security Concepts/3. NTFS and share permissions.mp4 152.4 MB
  • mp4~Get Your Files Here !/4. Endpoint Security Concepts/7. Patches and updates.mp4 84.6 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/5. Secure passwords.mp4 74.3 MB
  • mp4~Get Your Files Here !/4. Endpoint Security Concepts/4. Netstat, nslookup, tcpdump.mp4 70.3 MB
  • mp4~Get Your Files Here !/4. Endpoint Security Concepts/5. Verify that endpoint systems meet security policies and standards.mp4 66.6 MB
  • mp4~Get Your Files Here !/3. Basic network security concepts/11. VPN - lab.mp4 61.4 MB
  • mp4~Get Your Files Here !/4. Endpoint Security Concepts/1. Windows Firewall.mp4 60.7 MB
  • mp4~Get Your Files Here !/3. Basic network security concepts/8. IPS and IDS.mp4 57.8 MB
  • mp4~Get Your Files Here !/3. Basic network security concepts/6. IP addresses and NAT.mp4 53.6 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/1. Basic terms.mp4 50.7 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/3. RADIUS.mp4 50.4 MB
  • mp4~Get Your Files Here !/5. Incident Handling/3. Malware.mp4 45.2 MB
  • mp4~Get Your Files Here !/3. Basic network security concepts/2. MAC and ARP.mp4 45.0 MB
  • mp4~Get Your Files Here !/3. Basic network security concepts/1. Describe TCPIP protocol vulnerabilities.mp4 44.0 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/8. Hashing.mp4 43.3 MB
  • mp4~Get Your Files Here !/5. Incident Handling/2. Encryption.mp4 43.2 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/7. Encryption.mp4 43.2 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/9. Certificates.mp4 42.7 MB
  • mp4~Get Your Files Here !/2. Essential Security Principles/2. Authentication, authorization, and accounting (AAA).mp4 39.6 MB
  • mp4~Get Your Files Here !/5. Incident Handling/5. Confidentiality integrity availability.mp4 39.5 MB
【影视】 [ DevCourseWeb.com ] Udemy - Cybersecurity and Kali Linux - Hands-on course by TechLatest
收录时间:2023-12-29 文档个数:43 文档大小:2.6 GB 最近下载:2025-05-16 人气:6597 磁力链接
  • mp4~Get Your Files Here !/7. Module 7 - Wireless Fortification Pentesting Mastery/2. Web App Pentesting Practical.mp4 636.4 MB
  • mp4~Get Your Files Here !/10. Module 10 - Communicating Findings Reporting Mastery/2. Reporting Practical + Conclusion.mp4 283.4 MB
  • mp4~Get Your Files Here !/6. Module 6 - Crack the Code Password Mastery/2. Password Cracking Practical.mp4 265.1 MB
  • mp4~Get Your Files Here !/5. Module 5 - Hacking Mastery Strategic Exploitation/2. Exploitation Practical.mp4 222.1 MB
  • mp4~Get Your Files Here !/9. Module 9 - Human Manipulation Social Engineering/2. Social Engineering Practical.mp4 198.1 MB
  • mp4~Get Your Files Here !/8. Module 8 - Wireless Fortification Pentesting Mastery/2. Wireless Pentesting Practical.mp4 194.1 MB
  • mp4~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/3. Social Media Reconnaissance.mp4 142.0 MB
  • mp4~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/2. Vulnerability Assessment.mp4 121.4 MB
  • mp4~Get Your Files Here !/5. Module 5 - Hacking Mastery Strategic Exploitation/1. Exploitation Introduction.mp4 84.3 MB
  • mp4~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/3. Microsoft Azure Guide..mp4 54.4 MB
  • mp4~Get Your Files Here !/6. Module 6 - Crack the Code Password Mastery/1. Password Cracking Introduction.mp4 48.2 MB
  • mp4~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/2. Google Cloud Platform(GCP) Guide..mp4 47.9 MB
  • mp4~Get Your Files Here !/2. Module 2 AAG Guide(AWS, Azure & GCP Guide)/1. Amazon Web Services(AWS) Guide..mp4 46.0 MB
  • mp4~Get Your Files Here !/4. Module 4 - Infiltration Techniques Mastering Active Reconnaissance/3. Scanning.mp4 44.9 MB
  • mp4~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/4. Unveiling the Secrets of OS Fingerprinting in Cybersecurity with Kali Linux.mp4 44.7 MB
  • mp4~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/5. Target Validation in Cybersecurity with Kali Linux.mp4 39.9 MB
  • mp4~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/1. Reconnaissance — First Phase of Hacking.mp4 30.0 MB
  • mp4~Get Your Files Here !/1. Module 1 - Course Introduction & Teaser/2. Course Introduction.mp4 28.4 MB
  • mp4~Get Your Files Here !/8. Module 8 - Wireless Fortification Pentesting Mastery/1. Wireless Pentesting Introduction.mp4 24.5 MB
  • mp4~Get Your Files Here !/3. Module 3 - Target Discovery The Reconnaissance Art/6. Subdomain Discovery in Cybersecurity with Kali Linux.mp4 24.5 MB
【影视】 [ DevCourseWeb.com ] Cfe 101 - Cybersecurity For Everyone
收录时间:2023-12-29 文档个数:31 文档大小:1.5 GB 最近下载:2025-05-14 人气:2244 磁力链接
  • mp4~Get Your Files Here !/3 - Password Email Security/6 - Password Security.mp4 149.2 MB
  • mp4~Get Your Files Here !/5 - Mobile Device Remote Working Security/12 - Keeping Your Mobile Safe.mp4 132.7 MB
  • mp4~Get Your Files Here !/1 - Introduction Threats to Information Security/3 - Everyday Information Security Threats.mp4 112.7 MB
  • mp4~Get Your Files Here !/7 - Network Security/17 - Keep Your Network Safe.mp4 92.3 MB
  • mp4~Get Your Files Here !/1 - Introduction Threats to Information Security/1 - Cybersecurity for Everyone.mp4 90.0 MB
  • mp4~Get Your Files Here !/9 - Incident Response/19 - Incident Response.mp4 86.4 MB
  • mp4~Get Your Files Here !/5 - Mobile Device Remote Working Security/13 - Keeping Your Work Safe While Working Remotely.mp4 78.6 MB
  • mp4~Get Your Files Here !/6 - Physical Security/16 - When Safety Fails in the Real World.mp4 77.3 MB
  • mp4~Get Your Files Here !/3 - Password Email Security/7 - Securing Your Email Communications.mp4 74.6 MB
  • mp4~Get Your Files Here !/2 - Malware Security Policies/4 - Understanding Malware.mp4 70.1 MB
  • mp4~Get Your Files Here !/8 - Generative AI/18 - Generative AI.mp4 70.1 MB
  • mp4~Get Your Files Here !/4 - Social Engineering Phishing/11 - Spotting Dodging Phishing Scams.mp4 64.9 MB
  • mp4~Get Your Files Here !/2 - Malware Security Policies/5 - Why Security Policies Procedures Matter.mp4 62.2 MB
  • mp4~Get Your Files Here !/6 - Physical Security/15 - Staying Safe in the Real World.mp4 59.6 MB
  • mp4~Get Your Files Here !/4 - Social Engineering Phishing/10 - Understanding Combatting Phishing Attacks.mp4 55.8 MB
  • mp4~Get Your Files Here !/4 - Social Engineering Phishing/8 - Guarding Against Social Engineering.mp4 53.9 MB
  • mp4~Get Your Files Here !/4 - Social Engineering Phishing/9 - Staying Ahead of Social Engineering Scams.mp4 40.6 MB
  • mp4~Get Your Files Here !/10 - Conclusion/20 - Course Recap Next Steps.mp4 30.6 MB
  • mp4~Get Your Files Here !/5 - Mobile Device Remote Working Security/14 - Attacks on Remote Workers.mp4 29.5 MB
  • mp4~Get Your Files Here !/1 - Introduction Threats to Information Security/2 - Making the Most of This Course.mp4 21.3 MB
【影视】 [FreeCoursesOnline.Me] O`REILLY - The Complete Cybersecurity Bootcamp, 2nd Edition
收录时间:2023-12-27 文档个数:340 文档大小:6.7 GB 最近下载:2025-05-15 人气:10000 磁力链接
  • mp4Lesson 29 Hacking Mobile Platforms/003. 29.2 Hacking iOS.mp4 86.6 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/014. 17.13 Performing SMTP and DNS Enumeration.mp4 80.0 MB
  • mp4Lesson 21 Fundamentals of Wireless Hacking/004. 21.3 Exploring Wireless Threats.mp4 79.0 MB
  • mp4Lesson 33 Fundamentals of IoT Security/003. 33.2 Understanding IoT Attacks.mp4 76.8 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/015. 17.14 Conducting Additional Enumeration Techniques.mp4 75.8 MB
  • mp4Lesson 33 Fundamentals of IoT Security/002. 33.1 Introducing IoT Concepts.mp4 74.4 MB
  • mp4Lesson 29 Hacking Mobile Platforms/002. 29.1 Understanding Mobile Platform Attack Vectors.mp4 73.4 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/011. 17.1 Performing SNMP Enumeration.mp4 71.8 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/004. 17.3 Understanding Host Discovery.mp4 69.7 MB
  • mp4Lesson 5 Fundamentals of Incident Response/007. 5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4 68.5 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/007. 17.6 Scanning Beyond IDS and Firewall.mp4 68.2 MB
  • mp4Lesson 27 Hacking User Credentials/006. 27.5 Cracking Passwords with John the Ripper.mp4 66.1 MB
  • mp4Lesson 7 Intrusion Event Categories/009. 7.8 Understanding the MITRE ATT&CK Framework.mp4 65.8 MB
  • mp4Lesson 29 Hacking Mobile Platforms/004. 29.3 Hacking Android OS.mp4 63.8 MB
  • mp4Lesson 20 SQL Injection/005. 20.4 Exploring SQL Injection Tools.mp4 63.3 MB
  • mp4Lesson 21 Fundamentals of Wireless Hacking/003. 21.2 Understanding Wireless Encryption.mp4 62.7 MB
  • mp4Lesson 17 Active Reconnaissance, Scanning, and Enumeration/013. 17.12 Performing NTP and NFS Enumeration.mp4 61.8 MB
  • mp4Lesson 16 Information Gathering and Passive Reconnaissance/011. 16.10 Performing Footprinting through Social Engineering.mp4 59.1 MB
  • mp4Lesson 8 Digital Forensics Fundamentals/004. 8.3 Understanding Evidence Collection.mp4 57.2 MB
  • mp4Lesson 21 Fundamentals of Wireless Hacking/007. 21.6 Hacking Bluetooth.mp4 52.3 MB
【影视】 [ DevCourseWeb.com ] Udemy - The Cybersecurity Consultant Mindset
收录时间:2023-12-26 文档个数:32 文档大小:3.1 GB 最近下载:2025-05-14 人气:3009 磁力链接
  • mp4~Get Your Files Here !/3. Risk Management and Assessment/2. Introduction to Risk Management.mp4 222.8 MB
  • mp4~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/3. Understanding the Role of a Cyber Consultant.mp4 212.8 MB
  • mp4~Get Your Files Here !/7. Developing Soft Skills for Your Career/2. Communication and Interpersonal Skills.mp4 211.5 MB
  • mp4~Get Your Files Here !/3. Risk Management and Assessment/3. Compliance Requirements.mp4 204.7 MB
  • mp4~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/2. Overview of Cybersecurity.mp4 198.8 MB
  • mp4~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/5. Preparing for a Career in Cyber Consulting.mp4 196.6 MB
  • mp4~Get Your Files Here !/3. Risk Management and Assessment/5. Security Documentation Development.mp4 178.0 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/3. Vulnerability Assessment and Pentesting.mp4 177.6 MB
  • mp4~Get Your Files Here !/3. Risk Management and Assessment/4. Risk Assessment and Analysis.mp4 158.0 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/6. Cybersecurity Frameworks Selection.mp4 146.1 MB
  • mp4~Get Your Files Here !/5. Incident Response/3. Developing an Incident Response Plan.mp4 123.8 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/2. Network Scanning and Monitoring.mp4 115.2 MB
  • mp4~Get Your Files Here !/2. Introduction to Cybersecurity Consulting/4. Benefits of Cyber Consulting and Cons.mp4 102.7 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/5. Security Information and Event Management Systems.mp4 99.4 MB
  • mp4~Get Your Files Here !/6. Cybersecurity Auditing and Frameworks/4. Cybersecurity Frameworks - Implementation.mp4 81.3 MB
  • mp4~Get Your Files Here !/4. Tools and Technologies/4. Intrusion Detection and Prevention Systems.mp4 73.6 MB
  • mp4~Get Your Files Here !/6. Cybersecurity Auditing and Frameworks/3. Auditing Standards and Requirements.mp4 73.1 MB
  • mp4~Get Your Files Here !/6. Cybersecurity Auditing and Frameworks/2. Overview of IT Auditing.mp4 72.9 MB
  • mp4~Get Your Files Here !/7. Developing Soft Skills for Your Career/5. Practical Exercises and Resources.mp4 68.0 MB
  • mp4~Get Your Files Here !/5. Incident Response/2. Defining a Security Incident.mp4 67.7 MB
【影视】 [CourserHub.com] Coursera - Google Cybersecurity Professional Certificate
收录时间:2023-12-26 文档个数:1330 文档大小:4.1 GB 最近下载:2025-05-16 人气:11177 磁力链接
  • mp4foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/01_get-started-with-the-certificate-program/01_welcome-to-the-google-cybersecurity-certificate.mp4 49.6 MB
  • mp4assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/04_common-vulnerabilities-and-exposures.mp4 29.2 MB
  • mp4foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/01_the-history-of-cybersecurity/03_attacks-in-the-digital-age.mp4 26.8 MB
  • mp4assets-threats-and-vulnerabilities/02_protect-organizational-assets/03_authentication-authorization-and-accounting/03_the-mechanisms-of-authorization.mp4 26.4 MB
  • mp4assets-threats-and-vulnerabilities/04_threats-to-asset-security/02_malware/01_malicious-software.mp4 25.7 MB
  • mp4manage-security-risks/04_use-playbooks-to-respond-to-incidents/01_phases-of-incident-response-playbooks/02_phases-of-an-incident-response-playbook.mp4 25.5 MB
  • mp4assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/04_phishing-for-information.mp4 25.2 MB
  • mp4assets-threats-and-vulnerabilities/04_threats-to-asset-security/02_malware/03_the-rise-of-cryptojacking.mp4 24.8 MB
  • mp4foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/01_frameworks-and-controls/02_introduction-to-security-frameworks-and-controls.mp4 24.5 MB
  • mp4foundations-of-cybersecurity/01_welcome-to-the-exciting-world-of-cybersecurity/02_introduction-to-cybersecurity/01_introduction-to-cybersecurity.mp4 24.2 MB
  • mp4automate-cybersecurity-tasks-with-python/04_python-in-practice/03_debug-python-code/01_debugging-strategies.mp4 24.2 MB
  • mp4assets-threats-and-vulnerabilities/02_protect-organizational-assets/02_encryption-methods/01_fundamentals-of-cryptography.mp4 23.7 MB
  • mp4assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/01_protect-all-entry-points.mp4 23.6 MB
  • mp4foundations-of-cybersecurity/03_protect-against-threats-risks-and-vulnerabilities/02_ethics-in-cybersecurity/01_ethics-in-cybersecurity.mp4 23.6 MB
  • mp4assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/03_cyber-attacker-mindset/05_pathways-through-defenses.mp4 23.5 MB
  • mp4foundations-of-cybersecurity/02_the-evolution-of-cybersecurity/01_the-history-of-cybersecurity/02_past-cybersecurity-attacks.mp4 23.1 MB
  • mp4assets-threats-and-vulnerabilities/03_vulnerabilities-in-systems/01_flaws-in-the-system/02_vulnerability-management.mp4 23.0 MB
  • mp4networks-and-network-security/04_security-hardening/04_cloud-hardening/02_kelsey-cloud-security-explained.mp4 23.0 MB
  • mp4automate-cybersecurity-tasks-with-python/03_work-with-strings-and-lists/03_regular-expressions/01_regular-expressions-in-python.mp4 22.9 MB
  • mp4assets-threats-and-vulnerabilities/04_threats-to-asset-security/01_social-engineering/02_the-criminal-art-of-persuasion.mp4 22.7 MB
【影视】 Cybersecurity Architecture Fundamentals
收录时间:2023-12-26 文档个数:81 文档大小:2.4 GB 最近下载:2025-05-16 人气:6891 磁力链接
  • mp4Chapter 1 Introduction/006. Security Principles and Approaches.mp4 272.7 MB
  • mp4Chapter 1 Introduction/003. The Problem with Security Today.mp4 236.8 MB
  • mp4Chapter 1 Introduction/009. Understanding Residual Risk.mp4 120.0 MB
  • mp4Chapter 4 Cyber Architecture for Enterprise Security/006. Vulnerability, Patch, and Availability Management.mp4 102.8 MB
  • mp4Chapter 1 Introduction/008. Risk Management.mp4 99.6 MB
  • mp4Chapter 1 Introduction/005. Who Is a Security Architect.mp4 98.0 MB
  • mp4Chapter 2 Threat Modelling/006. PASTA.mp4 94.3 MB
  • mp4Chapter 4 Cyber Architecture for Enterprise Security/001. Network Security.mp4 80.3 MB
  • mp4Chapter 6 Case Study/001. Case Study Preview.mp4 78.0 MB
  • mp4Chapter 2 Threat Modelling/002. Threat Modelling Versus Risk Assessment.mp4 75.6 MB
  • mp4Chapter 2 Threat Modelling/001. Threat Modelling - Part 1.mp4 70.2 MB
  • mp4Chapter 2 Threat Modelling/009. Attack Trees.mp4 68.7 MB
  • mp4Chapter 4 Cyber Architecture for Enterprise Security/005. Data Protection.mp4 56.7 MB
  • mp4Chapter 5 Designing for Security/003. Reference Security Architectures.mp4 52.0 MB
  • mp4Chapter 2 Threat Modelling/003. Threat Modelling - Part 2.mp4 50.8 MB
  • mp4Chapter 3 Enterprise Architecture Frameworks/003. Zachman Framework.mp4 44.9 MB
  • mp4Chapter 5 Designing for Security/002. Security Design Pattern Example.mp4 44.6 MB
  • mp4Chapter 1 Introduction/004. Introduction to Security Architecture.mp4 42.6 MB
  • mp4Chapter 5 Designing for Security/001. Security Design Patterns.mp4 41.8 MB
  • mp4Chapter 3 Enterprise Architecture Frameworks/004. SABSA Framework.mp4 37.0 MB
【影视】 [ TutGee.com ] Linkedin - Practical Cybersecurity for IT Professionals
收录时间:2023-12-26 文档个数:81 文档大小:388.0 MB 最近下载:2025-05-08 人气:1804 磁力链接
  • mp4~Get Your Files Here !/04 - 3. Firewalls/03 - Advanced Windows Firewall.mp4 27.1 MB
  • mp4~Get Your Files Here !/05 - 4. Network Scanning/01 - Getting started with Nmap.mp4 22.0 MB
  • mp4~Get Your Files Here !/02 - 1. Why Cybersecurity/07 - Emerging trends in cybersecurity.mp4 20.4 MB
  • mp4~Get Your Files Here !/02 - 1. Why Cybersecurity/01 - A history of hackers.mp4 17.5 MB
  • mp4~Get Your Files Here !/04 - 3. Firewalls/05 - Introducing Linux iptables.mp4 16.1 MB
  • mp4~Get Your Files Here !/04 - 3. Firewalls/02 - Windows Firewall basics.mp4 14.5 MB
  • mp4~Get Your Files Here !/09 - 8. Network Protocols/02 - Capturing packets with Wireshark.mp4 14.3 MB
  • mp4~Get Your Files Here !/04 - 3. Firewalls/04 - ZedLan firewall log analyser.mp4 13.4 MB
  • mp4~Get Your Files Here !/02 - 1. Why Cybersecurity/04 - Common forms of cyberattack.mp4 13.1 MB
  • mp4~Get Your Files Here !/09 - 8. Network Protocols/03 - Making sense of the protocols.mp4 13.0 MB
  • mp4~Get Your Files Here !/02 - 1. Why Cybersecurity/02 - The cyber kill chain.mp4 12.0 MB
  • mp4~Get Your Files Here !/03 - 2. Antivirus/01 - Introducing Microsoft Defender Antivirus.mp4 11.7 MB
  • mp4~Get Your Files Here !/07 - 6. Vulnerability Scanning/01 - Preparing Nessus.mp4 10.5 MB
  • mp4~Get Your Files Here !/08 - 7. Web Applications/02 - Running an SQL injection attack.mp4 10.1 MB
  • mp4~Get Your Files Here !/05 - 4. Network Scanning/02 - Advanced Nmap options.mp4 10.0 MB
  • mp4~Get Your Files Here !/02 - 1. Why Cybersecurity/03 - Stuxnet and the kill chain.mp4 9.8 MB
  • mp4~Get Your Files Here !/03 - 2. Antivirus/02 - Detecting malware with Microsoft Defender.mp4 9.5 MB
  • mp4~Get Your Files Here !/04 - 3. Firewalls/06 - Setting up a simple iptables firewall.mp4 9.3 MB
  • mp4~Get Your Files Here !/06 - 5. Network Connections/02 - Transferring files using netcat.mp4 9.2 MB
  • mp4~Get Your Files Here !/06 - 5. Network Connections/04 - Setting up a netcat honeypot.mp4 8.9 MB
【影视】 Advanced Cybersecurity and Ethical Hacking with ChatGPT
收录时间:2023-12-25 文档个数:185 文档大小:1.5 GB 最近下载:2025-05-16 人气:13554 磁力链接
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/15 - CTF Challenges and Capture The Flag Events/48 - Introduction to Capture The Flag CTF Challenges.mp4 50.2 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/16 - Final Projects and Practical Assessments/52 - Building a Security Automation Workflow with ChatGPT.mp4 48.9 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/17 - Professional Development and Career Insights/55 - Navigating the Job Market and Advancing Your Cybersecurity Career.mp4 44.4 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/16 - Final Projects and Practical Assessments/53 - Penetration Testing Report Compilation with ChatGPT.mp4 39.3 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/17 - Professional Development and Career Insights/54 - Resume Building and Interview Preparation for Ethical Hackers.mp4 38.3 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/2 - Foundations of Cybersecurity and Hacking/7 - Operating System Fundamentals for Hacking and Penetration Testing.mp4 37.8 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/15 - CTF Challenges and Capture The Flag Events/49 - Solving CTF Challenges Using ChatGPT.mp4 37.3 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/5 - Vulnerability Identification and Assessment/17 - Network Vulnerability Scanning and Analysis with ChatGPT.mp4 36.8 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/1 - Section 1 Introduction to Cybersecurity and Ethical Hacking/4 - Understanding the Role of Ethical Hackers and Penetration Testers.mp4 36.4 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/11 - Case Studies and RealWorld Scenarios/36 - Ethical Hacking Case Studies Using ChatGPT.mp4 36.0 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/6 - Exploitation and Penetration Testing/21 - Penetration Testing Methodologies and Reporting.mp4 35.7 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/6 - Exploitation and Penetration Testing/20 - PostExploitation Techniques and Privilege Escalation.mp4 34.6 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/14 - Ethical Hacking in Cloud Environments/46 - Securing Containers and Serverless Architectures.mp4 34.5 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/3 - Getting Started with ChatGPT/10 - Setting Up and Configuring ChatGPT for Hacking Tasks.mp4 34.3 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/10 - Emerging Trends and Future of Cybersecurity/32 - Blockchain Security and Decentralized Technologies.mp4 33.2 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/13 - Cybersecurity Regulations and Compliance/43 - Conducting Compliance Audits with ChatGPT.mp4 33.0 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/7 - Advanced Ethical Hacking Techniques/24 - Wireless Network Hacking and Countermeasures Using ChatGPT.mp4 31.7 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/5 - Vulnerability Identification and Assessment/16 - Web Application Vulnerability Assessment Using ChatGPT.mp4 30.5 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/9 - ChatGPT for Security Innovation/28 - Leveraging ChatGPT for Threat Hunting and Analysis.mp4 30.1 MB
  • mp4[TutsNode.org] - Advanced Cybersecurity and Ethical Hacking with ChatGPT/3 - Getting Started with ChatGPT/11 - Navigating the ChatGPT Interface for Cybersecurity Analysis.mp4 28.8 MB
共10页 上一页 1 2 3 4 5 6 7 8 下一页